Chapter 1.6 - Vulnerabilities Flashcards

Explain the security concerns associated with various types of vulnerabilities

1
Q

Threat Intelligence

A

Research threats and threat actors so you can make educated decisions and preventions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Zero-day Attacks

A

An attack that has not been discovered yet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Open Permissions

A

No security on data allowing attackers to perform actions that exploit and system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Unsecure Root Accounts

A

Vulnerable to takeover due to poor security configuration
Example: weak passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Errors

A

Messages that can provide useful information to an attacker
Examples: service type, version information, debug data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Weak Encryption

A

The uses a key of insufficient length making it easier to attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Insecure Protocols

A

A protocol that introduces security concerns due to the lack of controls over confidentiality and/or integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Default Settings

A

Having preset credentials allowing access to all configurations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Open Ports and Services

A

Services open ports in which provides a pathway for attackers to exploit vulnerabilities in your system
Defend with a firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Third-Party Risks

A

The risk of outsourcing certain services or use software built by third parties to accomplish certain tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

System Integration Risk

A

The potential for integration of technology, processes, information, departments or organizations to fail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Lack of Vendor Support Risk

A

Vendors not taking initiative to fix their products

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Supply Chain Risk

A

The implementation of strategies to manage both everyday and exceptional risks along the supply chain based on continuous risk assessment with the objective of reducing vulnerability and ensuring continuity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Outsourced Code Development

A

Hiring a third-party service provider to handle software development projects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data Storage

A

Storing data with a third-party trust?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Improper Patch Management

A

The process of not distributing and applying updates to software

17
Q

Firmware Patch Management

A

The BIOS of the device

18
Q

Operating System Patch Management

A

Monthly and on-demand patches

19
Q

Applications Patch Management

A

Provided by the manufacturer as needed

20
Q

Legacy Platforms

A

An outdated computer system still in use

21
Q

Impacts to Third-Party Risks

A

Data loss, data breaches, data exfiltration, identity theft, financial, reputation, availability loss